New 70-687 Exam Questions Updated Today! PassLeader just released the latest Microsoft 70-687 pdf and vce exam dumps(Now Total 290q) with all new exam questions, which will help you 100% passing the newest 70-687 exam. This new questions are exactly the same as real test's. Now visit passleader.com to get the newest 290q 70-687 pdf or vce exam dumps with 10% discount and FREE VCE TEST SOFTWARE!

QUESTION 111You administer Windows 8.1 Enterprise client computers in your company network. You change settings on a reference computer by using the Windows Firewall with Advanced Security tool. You want to apply the same settings to other computers. You need to save the windows Firewall with Advanced Security configuration settings from the reference computer. You also need to be able to import the configuration settings into a Group Policy object later. What should you do?

A. Open Local Group Policy Editor, select the Local Policies node, and then select the Export List action.B. Open Local Group Policy Editor, select the Security Settings node, and then select the Export List action.C. Run the netsh advfirewall export c:settings.wfw command.D. Run the netsh advfirewall export c:settings.xml command.

Answer: CExplanation:* Netsh advfirewall is a command-line tool for Windows Firewall with Advanced Security that helps with the creation, administration, and monitoring of Windows Firewall and IPsec settings and provides an alternative to console-based management. T* Export subcommand Exports the Windows Firewall with Advanced Security configuration in the current store to a file. This file can be used with the import command to restore the Windows Firewall with Advanced Security service configuration to a store on the same or to a different computer.Syntax export [ Path ]FileNameParameters [ Path ] FileName Required. Specifies, by name, the file where the Windows Firewall with Advanced Security configuration will be written. If the path, file name, or both contain spaces, quotation marks must be used. If you do not specify Path then the command places the file in your current folder. The recommended file name extension is .wfw.Example In the following example, the command exports the complete Windows Firewall with Advanced Security service configuration to the file C:tempwfas.wfw. export c:tempwfas.wfwReference:Netsh Commands for Windows Firewall with Advanced Security

QUESTION 112An organization has client computers that run Windows 7. You install the Windows Assessment and Deployment Kit (ADK) in the environment. You capture user settings and data files to a network share, and then perform a clean installation of Windows 8.1 on the client computers. You need to apply the user profiles from the Windows 7 installation to the Windows 8.1 installation. What should you do?

A. Run the Ioadstate command.B. Copy the Default Profile to a folder on drive C.C. Run the scanstate command.D. Run Windows Easy Transfer and select the user profile to migrate.E. Run the ImageX command

Answer: AExplanation: http://4sysops.com/archives/windows-8-migration-user-data-and-settings/Windows 8 migration ­ User data and settingsUser State Migration Tools (USMT)You can extract the USMT tools from the Windows ADK.USMT is revised to version 5.0 for Windows Server 2012 and Windows 8, and consists of the following three programs:Scanstate.exe: This tool performs the user state backup Loadstate.exe: This tool performs the user state restore Usmtutils.exe: This tool enables you to verify compressed migration store files as well as extract contents from them

QUESTION 113An organization has client computers that run Windows 7. You upgrade the client computers to Windows 8.1 without migrating the local user profiles. You install the Windows Assessment and Deployment Kit (ADK) in the environment. You need to migrate the user profiles from the Windows 7 installation to the Windows 8.1 installation. What should you do first on each client computer?

A. Run the scanstate command.B. Run Windows Easy Transfer and select the user profile to migrate.C. Run the Ioadstate command.D. Copy the Default Profile to a folder on drive C.E. Run the ImaqeX command.

QUESTION 114A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You plan to upgrade the client computers to Windows 8.1 Pro. You need to choose the methods that do not require the manual entry of a product key during the upgrade. Which two methods should you choose? (Each correct answer presents a complete solution. Choose two.)

A. Use the Windows 8.1 online upgrade tool.B. Use Group Policy to assign the Windows 8.1 installation file to the client computers.C. Use the Microsoft Deployment Toolkit.D. Extract the contents of the Windows 8.1 .iso image file to a new shared folder and run the setup program from that folder.

Answer: CDExplanation:http://msdn.microsoft.com/en-us/library/dn475741.aspxMicrosoft Deployment ToolkitThe Microsoft Deployment Toolkit (MDT) provides a unified collection of tools, processes, and guidance for automating desktop and server deployments. In addition to reducing deployment time and standardizing desktop and server images, MDT offers improved security and ongoing configuration management.http://www.technize.net/install-windows-8-install-pxe-boot-network-lan/How To Install Windows 8 Over The Network (LAN)6. Now share the folder in which Windows 8 setup files are located. At least one user should be able to read the network folder to be able to run the setup remotely.http://technet.microsoft.com/en-us/library/hh824952.aspxWindows Setup Edition Configuration and Product ID Files (EI.cfg and PID.txt) Applies To: Windows 8, Windows 8.1, Windows Server 2012, Windows Server 2012 R2The edition configuration (EI.cfg) file and the product ID (PID.txt) file are optional configuration files that you can use to specify the Windows® product key and the Windows edition during Windows installation. You can use these files to automate the product-key entry page in Windows Setup instead of using an answer file. If you use an EI.cfg file to differentiate volume license media, but you do not include a PID.txt file, the user receives a prompt for a product key to continue Windows Setup.You can reuse the product key in the product ID file for multiple installations. The product key in the product ID file is only used to install Windows. This key is not used to activate Windows.

QUESTION 115A company has 50 client computers that run Windows 8.1. Forty client computers are connected to a secure internal network, and 10 client computers are located in public kiosks. A new company security policy includes the following requirements:- Visitors can access only kiosk computers. - Employees can access and shut down only internal computers. - Only administrators can access all computers remotely. - Only administrators can shut down kiosk computers.You need to assign security groups to local security policies to meet the requirements. What should you do? (To answer, drag the appropriate security group or groups to the correct location or locations in the answer area. Security groups may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

Answer:

QUESTION 116A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. Two computers named COMPUTER1 and COMPUTER2 are connected to one network switch and joined to the domain. Windows Firewall is turned off on both computers. You are planning a remote management solution. You have the following requirements: - Ensure that COMPUTER2 can run remote commands on COMPUTER1. - Test the solution by successfully running a command from COMPUTER2 that executes on COMPUTER1.You need to select the commands to run on COMPUTER1 and COMPUTER2 to meet the remote management requirements. Which commands should you run? (To answer, drag the appropriate command or commands to the correct location or locations in the answer area. Commands may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

QUESTION 117A company has a main office located in Miami, and brach offices in Boston, Los Angeles and Portland. the Office Networks are configured as described in the following table.A management computer in the main office, named COMPUTER1, runs Windows 8.1 and several third-party management applications.- Ensure that only users in the Boston office can connect to COMPUTER1 by using http.- Ensure that only users in the Los Angeles office can connect COMPUTER1 by using https- Ensure that only users in th Portland office can connect to COMPUTER1 by using FTP.You are configuring access to COMPUTER1. How should you configure windows firewall? (To answer, drag the appropriate elements to the correct location or locations in the answer area. Elements may be used once, more than once, or not at all. You ma need to drag the split bar between panes or scroll.)

QUESTION 118A computer currently runs a 32-bit version of Windows 7 Ultimate. You need to deploy a 64- bit version of Windows 8.1 to the computer. The new deployment must be the only version of Windows on the computer. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

Answer:

QUESTION 119Ten client computers run Windows Vista and a custom application. The custom application is compatible with Windows 8.1. You purchase 10 new computers that have Windows 8.1 pre- installed. You plan to migrate user settings and data from the Windows Vista computers to the Windows 8.1 computers. You install the User State Migration Toolkit (USMT) on a USB flash drive. You need to ensure that the custom application settings are applied to the Windows 8.1 computers after the migration is complete. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

Answer:

QUESTION 120A computer currently runs a 64-bit version of Windows 7 Enterprise. You need to deploy a 64-bit version of Windows 8.1 Pro to the computer. The new deployment must not affect the Windows 7 installation on the computer. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

QUESTION 121A client laptop runs Windows 7 Professional and a custom application. The custom application is compatible with Windows 8.1. You plan to migrate user settings and data from the client laptop to a new tablet PC that runs Windows 8.1 Pro. You install the User State Migration Toolkit (USMT) on a USB flash drive. You need to ensure that the custom application settings are applied to the tablet PC after the migration is complete. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

QUESTION 122You have a computer that runs Windows 8.1, and three unused external disk drives. You are creating a volume to store picture files. You have the following requirements:- Use all three external disk drives.- Ensure that the volume is accessible from a single drive letter. - Ensure data redundancy between the disk drives in the event of a hardware failure.You need to create the volume. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

QUESTION 123A desktop computer runs Windows 8.1. The computer is joined to an Active Directory Domain Services (AD DS) domain named contoso.com. You have two domain user accounts:- A primary account named User1 that does not have domain administrative privileges. - An account named Admin1 that has administrative privileges in the domain.You are currently logged in as User1. You need to run an application named appl.exe. You have the following requirements: - Start the application by using your administrative credentials.- Minimize the application load time.You need to complete the command to meet the requirements. Which command segments should you use to complete the command? (To answer, drag the appropriate command segments to the correct locations in the answer area. Command segments may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

Answer:

QUESTION 124A local printer named PRINTER1 is shared from a client computer named COMPUTER1 that run a 64-bit version of Windows 8.1. The workgroup contains client computers that run a 32-bit version of Windows 8.1. Computers in the workgroup can't currently print to PRINTER1. You need to ensure that the workgroup computers can print to PRINTER1. Which three actions should you perform in sequence? (To answer, move the appropriate actions to the answer area and arrange the correct order.)

QUESTION 125You have a computer that runs Windows 8.1, and three unused external disk drives. You are creating a volume to store picture files. You have the following requirements: - Use all three external disk drives. - Ensure that the volume is accessible from a single drive letter.- Maximize the available space.You need to create the volume. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

Answer: Explanation:Disk Management tool does not have a setting for disk resiliency. In Storage Pool select "Simple" (no resiliency): A simple storage space writes one copy of your data, and doesn't protect you from drive failures. A simple storage space requires at least one drive.

QUESTION 126A company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 8.1. Some computers have a Trusted Platform Module (TPM) chip. Members of the ITStaff security group are part of the local Power Users group on each client computer. You need to configure a single Group Policy object (GPO) that will allow Windows BitLocker Drive Encryption on all client computers by using the least amount of privilege necessary. Which commands should you run? (To answer, drag the appropriate command or commands to the correct location or locations in the answer area. Commands may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

QUESTION 127A Company has 10 computers that run windows vista. The computers are members of a workgroup The company plans to upgrade the computers to Windows 8.1. You are planning a deployment strategy. You need to ensure that users can log on to their existing accounts and access their existing data after the upgrade. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)

Answer:

QUESTION 128Drag and Drop QuestionYou administer Windows 8 Pro computers in your company network. A user informs you that he wants to use a picture password on his computer. You need to configure a picture password with a custom picture for the user. Which prerequisites should you comply with for each element in order to configure the required picture password? (To answer, drag the appropriate prerequisite or prerequisites to the correct element or elements in the answer area. Each prerequisite may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

Answer:

QUESTION 129Drag and Drop QuestionYou administer Windows 8.1 Pro computers in your company network. A user informs you that he wants to use a picture password on his computer. You need to configure a picture password with a custom picture for the user. Which prerequisites should you comply with for each element in order to configure the required picture password? (To answer, drag the appropriate prerequisite or prerequisites to the correct element or elements in the answer area. Each prerequisite may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

Answer:

QUESTION 130Hotspot QuestionYou install Windows 8.1 Enterprise on new laptops that will be shipped to remote users in the sales department of your company. You create new VPN connections on the laptops. Your company security policy requires that the maximum allowed network outage time for the VPN connection should be less than 10 minutes. You need to configure the required timeout. Which protocol should you use? (To answer, configure the appropriate option or options in the answer area.)